
Tip Tuesday: Improve cash flow with effective billing practices
If you’ve been a managed service provider (MSP) for a while, you’ve likely encountered demanding customers and overdue accounts. While there’s no foolproof way to completely resolve this challenge, improving your billing practices can help reduce the issue. Continue reading...

MSP Training: How often and what kind?
According to Barracuda Network’s Evolving Landscape of the MSP 2024 report, 38 percent of managed service providers (MSPs) offer security awareness training (SAT). However, experts say that the percentage should be much higher because of the high return on investment...
Sales & Marketing

Your flight plan for MSP Success: Knowing your audience and value proposition
For managed service providers (MSPs) striving to grow and stand out in a competitive market, a clear and actionable marketing strategy is essential. Much like preparing for a successful flight, knowing your audience and defining your unique value proposition are...

What does it mean to be a PRO MSP?
At my managed service provider (MSP) marketing agency, Tech Pro Marketing, the word PRO is in our name, but in recent years, it’s also become somewhat of a mantra. To me, it’s all about results and relationships. Results are everything...
Security

Cybersecurity Threat Advisory: EOL Juniper Networks MX routers targeted in attacks
Threat actor UNC3886 has been observed targeting end-of-life (EOL) MX routers from Juniper Networks as part of a sophisticated campaign designed to deploy custom backdoors. This group has demonstrated a particular focus on internal networking infrastructure, which allows them to...

Cybersecurity Threat Advisory: Moxa fixes severe authentication flaws
Moxa has issued a security advisory highlighting critical authorization vulnerabilities in several switch models, tracked as CVE-2024-12297, with a CVSS score of 9.2. Review the details of this Cybersecurity Threat Advisory to understand how to mitigate the impact of authentication...

Cybersecurity Threat Advisory: Vulnerability within TP-Link routers
A vulnerability that could lead to critical status, tracked as CVE-2023-1389, was identified in TP-Link Archer AX-21 routers. The Ballista botnet is currently exploiting this vulnerability, which can spread automatically across the web. Continue reading this Cybersecurity Threat Advisory to...
Better Business

The rise of cloud marketplaces: What’s fueling the growth?
According to a 2025 Key Issues and Prediction Report from The Futurum Group, more than a third of all deals moving through cloud marketplaces now involve some type of channel partner. Alex Smith is vice president and practice lead for...

Closing the cybersecurity skills gap: How MSPs can rescue businesses
Cybersecurity threats are growing in frequency and sophistication, and organizations industrywide are grappling with a critical shortage of skilled cybersecurity professionals to defend against them. A World Economic Forum report reveals that the cybersecurity skills gap widened by 8 percent last...

The power of internal compliance: Driving growth, trust, & efficiency for MSPs
For managed service providers (MSPs), internal compliance isn’t just about checking boxes; it’s about building credibility, mitigating risks, and creating a strong foundation for business growth. Our previous blog explored how MSPs can help their clients navigate the complex world...
Tech Insight

Tech Time Warp: The great Michelangelo scare
Thirty years ago, PC users worldwide were left saying “Huh?” after the much-hyped Michelangelo virus turned out to be, well, not much. Learn what the virus’ enduring legacy might say more about the media than about a security risk in...

Tech Time Warp: LISP programmer’s manual published
The artificial intelligence (AI) tools you use today have their roots in a programming language first released to the public 65 years ago. On March 1, 1960, the AI group led by John McCarthy at the Massachusetts Institute of Technology...

Tech Time Warp: An APT programming language
In conjunction with research centers like the Massachusetts Institute of Technology (MIT), the defense industry drove many rapid technological advances post-World War II. That’s where Douglas T. Ross and his team significantly sped up manufacturing with the development of the...